Webroot conducted research on web security in the U.S. and the UK. As remote users expand the security perimeter, the majority of companies reported significant effects in the form of increased help-desk time, reduced employee productivity and disruption of business activities. The impacts of web-borne attacks are...
Webroot commissioned a study to gauge the prevalence of web-borne attacks, their consequences and how IT pros are responding. Among the results: the vast majority of companies surveyed experienced one or more types of web-borne attacks in 2012. The survey report also includes recommendations - such as deploying a...
According to Gartner, 38% of companies will stop issuing laptops to employees by 2016. Clearly, BYO for laptops - and tablets and smartphones too - is a trend that is picking up steam. However, the apprehension about the best way to implement BYO is also growing with concerns around corporate compliance and...
For the first time the Ponemon Institute has conducted a study that reveals the facts behind the impact that weak threat intelligence is having on organizations.
Today's headlines and a barrage of marketing content lead many enterprise IT security and risk professionals to conclude that common cybercriminal tactics...
How are organizations addressing fraud, cyberthreats?
66% of respondents say credit/debit card fraud is most common form of fraud.
62% say fraud incidents are still discovered not by institutions, but by customers.
55% say their biggest barrier to fraud prevention is simply customer awareness.
These are...
Financial services companies have been the target of a serious, sustained, and well-funded DDoS campaign for more than a year. What these attacks have demonstrated is that DDoS will continue to be a popular and increasingly complex attack vector. DDoS is no longer simply a network issue, but is increasingly a feature...
This document provides you with an understanding of common cybersecurity tests and assessments organizations can use to evaluate their security posture and the distinctions between them. It will help you more accurately determine which assessment may be appropriate for your organization's needs.
Use this white...
Organizations of all sizes and across all industries need to prepare for, respond to and recover from complex and large-scale security incidents.
The ten tips provided in this white paper will help you to:
Minimize the duration and impact of a security incident;
Prioritize changes to enhance the security of...
No matter the size of your organization, advanced cyber-attacks represent a credible threat to your organization.
Security analyst firm Securosis and Dell SecureWorks collaborated on this guide to help:
Gather intelligence;
Mine for threat indicators;
Respond to alerts;
Break the attack process.
Distributed denial-of-service (DDoS) attacks are prevalent and growing, especially in the financial services industry. According to a Ponemon Institute survey, 64% of banking IT professionals reported a DDoS attack in 2012, and 43% expected attacks to increase in 2013. Yet the same survey found that only 30% of...
Account takeover is becoming more prevalent and difficult to combat as data breaches increase and phishing scams continue to evolve. In this white paper, NuData Security examines the recent trends relating to account takeover and makes recommendations in protecting against this financially destructive fraud.
This...
Mobile devices - smartphones and tablets - are powerful computers that are increasingly used for commerce and financial transactions. Consumers will spend $235 billion through mobile transactions, making mobile devices a very lucrative channel and the next frontier for cybercriminals to exploit. The threats against...
Starting with the Federal Financial Institutions Examination Council (FFIEC) requirements, this white paper describes how Tenable's unified security monitoring platform meets and exceeds these requirements, ensuring continuous compliance, lower total cost of ownership, tangible security risk reduction and the ability...
Why have targeted advanced threats succeeded so dramatically when most organizations have architected sophisticated defense-in-depth strategies? Because most of the tools and strategies organizations possess were built for the last generation of security threats.
Download this eBook and learn why:
First generation...
Financial institutions today have vast quantities of data available that can be used to flag potential fraudulent transactions, but many struggle to effectively leverage this data to fight fraud. This inability to make sense of available data not only reduces the amount of fraud activity detected, but can put the bank...